search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Solarwinds Network Performance Monitor 10.2.2 contains multiple vulnerabilities

Vulnerability Note VU#174119

Original Release Date: 2012-08-03 | Last Revised: 2014-08-15


Solarwinds Network Performance Monitor 10.2.2 and possibly earlier versions contain a cross-site scripting (XSS), and cross-site request forgery (CSRF) vulnerability.


Solarwinds Network Performance Monitor 10.2.2 can be attacked by modifying the snmpd.conf file with malicious JavaScript (XSS) (CWE-79) (CVE-2012-2577). The malicious JavaScript is stored in the application and then may be leveraged to mount an CSRF (CWE-352) (CVE-2012-2602) attack against a logged on administrator.


A remote unauthenticated attacker may obtain sensitive information, cause a denial of service condition or execute arbitrary code with the privileges of the application.


Apply an Update

Solarwinds has released Network Performance Monitor 10.3.1 to address these vulnerabilities. Customers may obtain the update from the Solarwinds Customer Portal.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing a web interface using stolen credentials from a blocked network location.

Vendor Information



Notified:  June 26, 2012 Updated: August 03, 2012



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.3 E:POC/RL:OF/RC:C
Environmental 1.3 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND



Thanks to Offensive Security for reporting these vulnerabilities.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2012-2602, CVE-2012-2577
Date Public: 2012-07-20
Date First Published: 2012-08-03
Date Last Updated: 2014-08-15 02:45 UTC
Document Revision: 17

Sponsored by CISA.